Sciweavers

359 search results - page 70 / 72
» A Clustering Approach for Achieving Data Privacy
Sort
View
STOC
2004
ACM
145views Algorithms» more  STOC 2004»
14 years 7 months ago
Using mixture models for collaborative filtering
A collaborative filtering system at an e-commerce site or similar service uses data about aggregate user behavior to make recommendations tailored to specific user interests. We d...
Jon M. Kleinberg, Mark Sandler
BMCBI
2008
128views more  BMCBI 2008»
13 years 7 months ago
In silico analysis of expressed sequence tags from Trichostrongylus vitrinus (Nematoda): comparison of the automated ESTExplorer
Background: The analysis of expressed sequence tags (EST) offers a rapid and cost effective approach to elucidate the transcriptome of an organism, but requires several computatio...
Shivashankar H. Nagaraj, Robin B. Gasser, Alasdair...
CVPR
2008
IEEE
14 years 9 months ago
Unifying discriminative visual codebook generation with classifier training for object category recognition
The idea of representing images using a bag of visual words is currently popular in object category recognition. Since this representation is typically constructed using unsupervi...
Liu Yang, Rong Jin, Rahul Sukthankar, Fréd&...
MOBIHOC
2007
ACM
14 years 7 months ago
Bounds for the capacity of wireless multihop networks imposed by topology and demand
Existing work on the capacity of wireless networks predominantly considers homogeneous random networks with random work load. The most relevant bounds on the network capacity, e.g...
Alireza Keshavarz-Haddad, Rudolf H. Riedi
CCGRID
2006
IEEE
14 years 1 months ago
Proposal of MPI Operation Level Checkpoint/Rollback and One Implementation
With the increasing number of processors in modern HPC(High Performance Computing) systems, there are two emergent problems to solve. One is scalability, the other is fault tolera...
Yuan Tang, Graham E. Fagg, Jack Dongarra